SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 328 
OFFLINE AND ONLINE SIGNATURE VERIFICATION SYSTEMS: A SURVEY Yogesh V.G.1, Abhijit Patil2 1Assistant Professor, Department of MCA, BKIT Bhalki, Karnataka, India 2Assistant Professor, Department of Computer Science, KASC Bidar, Karnataka, India Abstract In recent years, due to the extraordinary diffusion of the internet in our daily life and simultaneously growing need of personal verification in many daily applications has driven signature verification system as an important aspect. This paper presents the survey about the offline & online signature verification system. Feature extraction stage is the most important stage in both on- line & off-line signature verification. The successful implementation of any such verification system depends mainly on how effectively the features have been extracted & used for classification. The robust features yield a successful verification system. Hence, in this paper, we are focusing on to put up with various feature extraction techniques & classifiers employed by various authors to attempt signature verification system. This paper summarizes different techniques used in signature verification system with their merits and demerits. Keywords: offline, online, signature verification. 
---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In the past few decades the technology is rapidly growing at a very fast pace. Due to the advent of computers & internet lot of transactions are going online as well as offline. The increase in number of transactions is the boon of this latest cutting edge technology that can be done at a mind boggling speed. The technology has increased the convenience but at the same time security is at the stake, lot of false transactions are going around because of forgeries done by some anti-social elements which is leading to huge financial loss to the concerned person & to the society as a whole. We need some mechanism by which we can verify that the concerned transaction is genuine & not the forged one. 
One useful methodology is the biometric system. It is used to confirm & verify the identity of the concerned user. Biometric are of two types 1) Physical 2) behavioral. In physical biometric individual person’s iris, palm, thumb impression can be used to recognize & verify the individual. Whereas the behavioral biometric could be signature, voice etc. However, if a single biometric of an individual is under study, then it is referred as unimodal biometrics. if more than one biometrics of an individual is used for verification is called as multimodal biometric. In unimodal biometric systems there exists number of problems such as noisy data, spoof attacks, restricted degrees of freedom, intra-class variations, non-universality, and unacceptable error rates. Multimodal biometric system that integrates the evidence presented by multiple sources of information of an individual and it is an alternative to overcome some of the limitations of the unimodal. There are number of algorithms have been presented on multimodal and uinimodal biometrics to deal the authenticity of an individual. However, in this paper, we consolidated the gist of unimodal algorithms and their performance in signature verification system. Signature is an ultimate biometrics to authenticate an individual. The signatures are used in cheques, legal transactions etc to determine the individual identity. The legalization of any document takes place by putting a signature on it. This problem can be dealt in two ways: 1) Online signature verification 2) Offline signature verification In some transactions online signatures are used where the user is provided with a pen based tablet. The user has to do his signature on that tablet then that signature will be recorded in the system/computer. Signature trajectory, pen pressure, pen downs & pen ups will be captured by the tablet & sent to the system/computer. Then it will verify with the database whether it is genuine or forged one. On the other hand offline signature is the one which can be obtained by signing on the simple paper & then scanning it to the computer. Now the system will judge whether it is a genuine or forged one. Offline signature does not require any specific hardware whereas online signatures require a lot of hardware & software to determine genuineness. As a rule it is impossible to know in advance which of the approaches is novel. In this paper, we have done a survey on the various methods used in offline & online signature verification with its accuracies. 1.1 Signature Characteristics 
A signature is handwritten graphical representation which is used to authenticate individuality. Signature of a person may vary according to his mood, health etc. Even the genuine signer may not replicate his own signature as it is, some
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 329 
minor change will be there. Hence, it is difficult to distinguish that whether signature is genuine or forged one. A person’s signature often changes depending on some elements such as mood, fatigue, time etc. Great inconsistency can even be observed in signatures according to their country, habits, psychological or mental state, physical and practical conditions. Signatures can be treated as an image because a person may use any symbol, line, Curve & letter or group of letters as a signature Shown in fig1. Hence it is a perfect candidate for image processing & pattern recognition. Fig.1. A sample of signatures 2 METHODOLOGIES The methodology employed for offline and online signature verification is depicted in Figure 2. The methodology involves signature acquisition, pre-processing, feature extraction and comparison with an enrolled signature template as a knowledge base to draw the decision between genuine and forged one. Each steps of the methodology is explained in the following Subsections. 2.1 Image Acquisition Signature image acquisition is a crucial stage of any recognition system. The resolution, skew and isolated components of signature makes the problem more complex. 2.2 Pre-Processing (Noise Removal) This involves Normalizing, Converting a grey scale image to a binary image or its vice-versa, removing of spurious pixels (noise) etc. 2.3 Feature Extraction Features can be classified in to two types global & local. Global features describe the signature as a whole for ex: width & height of signature, width to height ratio. Local features are confined to a limited portion of the image/signature for ex: a grid of the signature. Fig 2: signature verification system 
Table -1: Different approaches used in offline signature verification 
Features 
Classifiers 
Dataset 
Accuracy 
Random Transform & Fractal Dimension [1] 
SVM 
SVC- 2004 
- 
Curve let Transform, edge detection, Hough Transform, [2] 
Modular Neural Network(MNN)with Mandeni Fuzzy Inference System, Artificial Neural Network 
Used 270 Images 210- Tranning 60- Testing 
96% 
Projection &Local point ensity,COG, Spatial Frequency Distribution [4] 
Euclidean Distance ,Least Square Error 
100 Image 
- 
Statistical Analysis Using Chi- Square Test [6] 
PSO –NN Algorithm Probability 
GPDS 
78% 
Projection &Local point Density, COG, Spatial Frequency Distribution [3] 
Feature Vector, Correlation, Mean & deviation 
- 
- 
Radon Transformation Fractal Dimension With Kart method[5] 
SVM Based on (SRM) , SVM 3 kernels 
SVC 2004 
92.2% of FAR 10% of FRR 
Interpolation Using NN 
KNN, Learning Vector Quantization, Euclidean Distance Metric 
945 Signs 
94% 
Energy method ,Directional Feature Method ,Chain Code used as a Directional Feature [ 8 ] 
Neural Network 
100 signs 50forged 50 genuine 
Global & Local features , Distance Matrices ,Geometric Normalization [9] 
Euclidean Distance, Gaussian Empirical Rule, CMC curve 
5400 Signs 
97.17%
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 330 
Static Image Processing , Novel Feature Extraction [ 10 ] 
Euclidean Distance 
160Signs 80 genuine 80 Skilled forged 
FAR is 1% FRR is 0.5% 
Grid Features , Global Features [11] 
KNN Classifier , Neural Network(NN) 
600 sign 
FAR is 4.16 FRR is 7.51% 
Binary Feature Vector , Gradient Direction Extraction, Aquinas Spatial Pyramid [14] 
Automatic Classifier & Manual Classifier 
CEDAR & GPDS 
92% on CEDAR , 87% on GPDS 
Discrete Wavelet Transformation , Image Registration , Image Fusion [12] 
Registration by finding COG & with Euclidean Distance 
90 sign 
92.2% 
Graph Matching(Bipartite Graph) , Radon Transformation [13] 
Euclidean Distance , Cross Validation , HMM , Hungarian Method 
- 
Vigorous research has been pursued in signature verification System for a number of years. In the area of Signature verification, especially offline Signature verification, different technologies have been used and still the area is to be explored. The techniques used by different researchers differ in the type of features extracted, the training and testing methods used, and classification, verification model used. 2.4 Comparison/Classification: This is based on an algorithm which is capable of deciding whether to accept or reject the Signature which is under test. False Acceptance Rate :the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. In case of similarity scale, if the person is an imposter in reality, but the matching score is higher than the threshold, then he is treated as genuine. False Rejection Rate: the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percentage of valid inputs which are incorrectly rejected. Table 1 depicts the different approaches used in offline sign verification along with its accuracy. 
Table 2 depicts the different approaches used in online sign verification along with its accuracy 
Table -2: Different approaches used in online signature verification 
Features & Classifiers 
Dataset Users/Sig 
Accuracy 
BPNN, Probabilistic model & Fusion [15] 
SVC 2004 
FRR=0.3 FAR=0.5 
Dynamic time warping [16] 
SVC 2004 
FRR=5.5 FAR=4.13 
Support Vector Machines Based on LCSS Kernel Function[17] 
SVC 2004 
ERR 6.84 
Neural Networks Classifiers & Fuzzy Inference[24] 
20/600 
FRR=21.5 FAR=3.5, FRR=3.5 FAR=0.0 
HMM/ANN[18] 
MCYT 
ERR 0.12 
PWC ,HMM [ 20] 
MCYT 
EER 6.67 EER 2.12 
Bp ANN 
150 
FRR:1.8 FAR: 2 
Bayes classifiers [22] 
94/1247 
FRR:2.19 FAR: 3.5 
HMM [ 21 ] 
2/120 
FRR:6.67 FAR:0.0 
40/1440 
FRR:9.94 FAR:0.5 
2/1100 
FRR:11.3 FAR:2.0 
String Matching [ 20] 
102/1232 
FRR:2.8 FAR:1.6 
PDF Classifiers [19] 
5/25 
FAR:5 
3. OUR FUTURE WORK As we could observe, despite the vast amount of work performed thus far for offline & online signature verification, there are still many challenges in this research area. Signatures may be written in different languages and we need to undertake a systematic study on this. One problem of this area is, for security reasons, it is not easy to get a signature dataset of real signatures (such as banking documents) available to the signature verification system. Publicly availability of signature datasets of real documents would make it possible to define a common experimentation protocol in order to perform comparative studies in this field. Researchers have used different features for signature verification. Combination of different classifiers as well as novel classifiers should be explored in future work to enhance performance.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 331 
4. CONCLUSIONS According to our study, in the learning process & in the training process of the system there is still room for the enhancement of the result. As the above described study shows that the algorithm which is used to analyze complex strokes of the signatures is still not satisfying. There is still further scope of improvement. Accordingly in this survey we noted that all the published work is based on foreground information. A combination of background and foreground information may be considered for better results in the future. ACKNOWLEDGEMENTS We express our sincere gratitude to Dr .Mallikarjun Hangarge for supporting us in the entire manner for writing the paper. REFERENCES [1] K. N. Pushpalatha, Aravind Kumar Gautham, D. R.Shashikumar,K. B. ShivaKumar, and Rupam Das ”Offline Signature Verification with Random and Skilled Forgery Detection Using Polar Domain Features and Multi Stage Classification-Regression Model”, International Journal of Advanced Science and Technology, Vol.59, (2013), pp.27-40 . [2] Omid Mirzaei , Hassan Irani and Hamid Reza Pourreza “Offline Signature Recognition using Modular Neural Networks with Fuzzy Response Integration”, 2011 International Conference on Network and Electronics Engineering, IPCSIT vol.11 (2011) © (2011) IACSIT Press, Singapore. [3] Khamael Abbas, Al-Dulaimi ”Handwritten Signature Verification Technique Based on Extract Features“, International Journal of Computer Applications (0975 – 8887), Volume 30– No.2, September 2011. [4] Priya Metri, Ashwinder Kaur, “Handwritten Signature Verification using Instance Based Learning”, International Journal of Computer Trends and Technology- March to April Issue 2011. [5] Mehdi Radmehr, Seyed Mahmoud Anisheh,Mohsen Nikpour,Abbas Yaseri, “Designing an Offline Method for Signature Recognition”, World Applied Sciences Journal 13 (3): 438-443, 2011,ISSN 1818-4952,© IDOSI Publications, 2011 [6] M Taylan Das, Canan Dulger,H. Ergin Dulger, ”Offline signature Verification (SV) using the Chi- square statistics”, International Journal of Biometrics, Volume 3 Issue 1, December 2011,Pages 2-12. [7] Srikanta Pal,Michael Blumenstein,Umapada Pal,“ Automatic Off-Line Signature Verification Systems: A Review”, IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET), (14):20-27, 2011. [8] Minal Tomar and Pratibha Singh, “A Directional Feature with Energy based Offline Signature Verification Network”, International Journal on Soft Computing ( IJSC ), Vol.2, No.1, February 2011. 
[9] Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing,”Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory”, International Journal of Securityand Its Applications,Vol. 4, No. 3, July, 2010. 
[10] Dr. Daramola Samuel, Prof. Ibiyemi Samuel, “Novel Feature Extraction Technique For Off-line Signature Verification System”, International Journal of Engineering Science and Technology Vol. 2(7), 2010, 3137-3143. 
[11] Shashi Kumar D. R, K. B. Raja, R. K. Chhotaray, Pattanaik Sabyasachi,” Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks” , International Journal of Engineering Science & Technology, vol.2(12), 2010, 7035-7044. [12] Samaneh Ghandali,Mohsen Ebrahimi Moghaddam,“Off- Line Persian Signature Identification and Verification Based on Image Registration & Fusion”, Journal of Multimedia, Vol. 4,No 3, (2009), 137,144, Jun 09. doi:10.4304/jmm.4.3.137-144. [13] Ramachandra A C, Ravi J, K B Raja,Venugopal K R And L.M Patnaik,”Signature Verification using Graph Matching and Cross-Validation Principle”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009. 
[14] Larkins, Mayo M.,”Adaptive Feature Thresholding for off-line signature verification”, Image and Vision Computing New Zealand, 2008. IVCNZ 2008, 23rd International Conference, page no:1-6. [15]. Dr.Mohammed J. Alhaddad”, Multiple Classifiers to verify the Online Signature”, World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221- 0741Vol. 2, No. 2, 46-50, 2012. [15] Ahmed Galib Reza,Hyotaek Lim & Md Jahangir Alam, “An Efficient Online Signature Verification Scheme Using Dynamic Programming Of String Matching”, ICHIT 2011,LNCS 6935,pp.590- 597,2011. 
[16] Gruber C, Gruber T, Krinninger S, Sick B. ”Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions”, Published in: Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on (Volume:40 , Issue:4 ), Biometrics Compendium, IEEE,Publication Year:2010, Page(s): 1088 – 1100. 
[17] Zhong-HuaQuan, De-Shuang Huang, Kun-Hong Liu, Kwok-Wing Chau,“A Hybrid HMM/ANN Based Approach for Online Signature Verification“,Published in:, Neural Networks, IJCNN 2007, page no 402-405. 
[18] Kiran, G.V., Kunte, R.S.R., Samuel, S. “On-line signature verification system using probabilistic feature modeling”,Published in:Signal Processing and its Applications, Sixth International, Symposium on 2001 (Volume:1 ), page no:355. [19] A.K Jain, F.D Griess, & S.D.Connell,”Online Signature Verification”, Pattern Recognition, 35(2002)2963- 2972.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 332 
[20] Mingfu Zou , Jianjun Tong , Changping Liu, Zhengliang Lou “On-line signature verification using local shape analysis” , Published in: Document Analysis and Recognition, 2003. Proceedings,page no:314-318,vol. 1. 
[21] Alisher Kholmatov, Berrin Yanikoglu “Biometric Authentication Using Online Signatures “,In Proc. ISCIS, Springer LNCS-3280 (2004) 373– 380. [22] Julian Fierrez Aguilar, Loris Nanni, Jaime Lopez ”An OnLine Signature Verification System Based on Fusion of Local and Global Information”, T. Kanade, A. Jain, and N.K. Ratha (Eds.): AVBPA 2005, LNCS 3546, pp. 523–532, 2005, Springer-Verlag Berlin Heidelberg 2005. [23] M.Khalid, Hamam Mokayed, R.Yusof and OsamuOno,”Online Signature Verification with Neural Networks Classifier and Fuzzy Inference”, Third Asia International Conference on Modelling & Simulation, 2009, AMS09, page no:236-241.

More Related Content

What's hot

Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkEditor IJMTER
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognitionPiyush Mittal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature RecognizationFaimin Khan
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingNabila mahjabin
 
Recent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemsRecent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemseSAT Journals
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingNikhil Hubballi
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometricsSwapnil Bangera
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peakseSAT Publishing House
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkeSAT Journals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationIJERA Editor
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personEditor IJMTER
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verificationlemon_au
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...IJNSA Journal
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...IJTET Journal
 

What's hot (20)

Handwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural NetworkHandwritten Signature Verification using Artificial Neural Network
Handwritten Signature Verification using Artificial Neural Network
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
Online signature recognition
Online signature recognitionOnline signature recognition
Online signature recognition
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Biometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae MatchingBiometric Fingerprint Recognintion based on Minutiae Matching
Biometric Fingerprint Recognintion based on Minutiae Matching
 
Recent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systemsRecent developments in iris based biometric authentication systems
Recent developments in iris based biometric authentication systems
 
Minutiae-based Fingerprint Matching
Minutiae-based Fingerprint MatchingMinutiae-based Fingerprint Matching
Minutiae-based Fingerprint Matching
 
Signature verification in biometrics
Signature verification in biometricsSignature verification in biometrics
Signature verification in biometrics
 
Dorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaksDorsal hand vein pattern authentication by hough peaks
Dorsal hand vein pattern authentication by hough peaks
 
An offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural networkAn offline signature recognition and verification system based on neural network
An offline signature recognition and verification system based on neural network
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
699 703
699 703699 703
699 703
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Overlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint AuthenticationOverlapped Fingerprint Separation for Fingerprint Authentication
Overlapped Fingerprint Separation for Fingerprint Authentication
 
A Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a personA Review on Robust identity verification using signature of a person
A Review on Robust identity verification using signature of a person
 
Off-line Signature Verification
Off-line Signature VerificationOff-line Signature Verification
Off-line Signature Verification
 
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
OFFLINE SIGNATURE RECOGNITION VIA CONVOLUTIONAL NEURAL NETWORK AND MULTIPLE C...
 
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
Reduction of False Acceptance Rate Using Cross Validation for Fingerprint Rec...
 

Viewers also liked

Raport z warsztatów - projektowanie przyszłości madaliny
Raport  z warsztatów - projektowanie przyszłości madalinyRaport  z warsztatów - projektowanie przyszłości madaliny
Raport z warsztatów - projektowanie przyszłości madalinyArtur Brzyski
 
SlideShare Unsur Kimia Halogen
SlideShare Unsur Kimia HalogenSlideShare Unsur Kimia Halogen
SlideShare Unsur Kimia HalogenDika Fiqri Jatmiko
 
Spark Cassandra Connector: Past, Present, and Future
Spark Cassandra Connector: Past, Present, and FutureSpark Cassandra Connector: Past, Present, and Future
Spark Cassandra Connector: Past, Present, and FutureRussell Spitzer
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a ServiceSagi Brody
 
次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」Ryota Sakuragi
 
2 bed apartment al arta 4 community view the greens 1156.36 sq ft
2 bed apartment al arta 4 community view the greens 1156.36 sq ft2 bed apartment al arta 4 community view the greens 1156.36 sq ft
2 bed apartment al arta 4 community view the greens 1156.36 sq ftProperty Listing Search
 
Evidence based practice
Evidence based practiceEvidence based practice
Evidence based practiceamz741987
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecsBucephalos Business
 
GA: 6 Do's and Don'ts of Pitching
GA: 6 Do's and Don'ts of PitchingGA: 6 Do's and Don'ts of Pitching
GA: 6 Do's and Don'ts of PitchingSlideChef
 
Organizational Behaviour Chapter One
Organizational Behaviour Chapter OneOrganizational Behaviour Chapter One
Organizational Behaviour Chapter OneGanta Kishore Kumar
 
Escape From Hadoop: Spark One Liners for C* Ops
Escape From Hadoop: Spark One Liners for C* OpsEscape From Hadoop: Spark One Liners for C* Ops
Escape From Hadoop: Spark One Liners for C* OpsRussell Spitzer
 

Viewers also liked (14)

Raport z warsztatów - projektowanie przyszłości madaliny
Raport  z warsztatów - projektowanie przyszłości madalinyRaport  z warsztatów - projektowanie przyszłości madaliny
Raport z warsztatów - projektowanie przyszłości madaliny
 
SlideShare Unsur Kimia Halogen
SlideShare Unsur Kimia HalogenSlideShare Unsur Kimia Halogen
SlideShare Unsur Kimia Halogen
 
Blended learning: experience of the Belarusian State University of Informatic...
Blended learning: experience of the Belarusian State University of Informatic...Blended learning: experience of the Belarusian State University of Informatic...
Blended learning: experience of the Belarusian State University of Informatic...
 
Spark Cassandra Connector: Past, Present, and Future
Spark Cassandra Connector: Past, Present, and FutureSpark Cassandra Connector: Past, Present, and Future
Spark Cassandra Connector: Past, Present, and Future
 
Tutorial delicious (1)
Tutorial delicious (1)Tutorial delicious (1)
Tutorial delicious (1)
 
TroubleShooting as a Service
TroubleShooting as a ServiceTroubleShooting as a Service
TroubleShooting as a Service
 
次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」次世代の新しい企業支援を創る「JASISAのご紹介」
次世代の新しい企業支援を創る「JASISAのご紹介」
 
Seabreeze-August
Seabreeze-AugustSeabreeze-August
Seabreeze-August
 
2 bed apartment al arta 4 community view the greens 1156.36 sq ft
2 bed apartment al arta 4 community view the greens 1156.36 sq ft2 bed apartment al arta 4 community view the greens 1156.36 sq ft
2 bed apartment al arta 4 community view the greens 1156.36 sq ft
 
Evidence based practice
Evidence based practiceEvidence based practice
Evidence based practice
 
Le reseau des professionnels grecs
Le reseau des professionnels grecsLe reseau des professionnels grecs
Le reseau des professionnels grecs
 
GA: 6 Do's and Don'ts of Pitching
GA: 6 Do's and Don'ts of PitchingGA: 6 Do's and Don'ts of Pitching
GA: 6 Do's and Don'ts of Pitching
 
Organizational Behaviour Chapter One
Organizational Behaviour Chapter OneOrganizational Behaviour Chapter One
Organizational Behaviour Chapter One
 
Escape From Hadoop: Spark One Liners for C* Ops
Escape From Hadoop: Spark One Liners for C* OpsEscape From Hadoop: Spark One Liners for C* Ops
Escape From Hadoop: Spark One Liners for C* Ops
 

Similar to Offline and online signature verification systems a survey

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
A comparative study of biometric authentication based on handwritten signatures
A comparative study of biometric authentication based on handwritten signaturesA comparative study of biometric authentication based on handwritten signatures
A comparative study of biometric authentication based on handwritten signatureseSAT Journals
 
A comparative study of biometric authentication based
A comparative study of biometric authentication basedA comparative study of biometric authentication based
A comparative study of biometric authentication basedeSAT Publishing House
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET Journal
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemIJTET Journal
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Editor Jacotech
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...eSAT Journals
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm securityeSAT Journals
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification systemeSAT Journals
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMAM Publications
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNNIRJET Journal
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodeSAT Publishing House
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesIOSR Journals
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition systemeSAT Journals
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 

Similar to Offline and online signature verification systems a survey (20)

BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
A comparative study of biometric authentication based on handwritten signatures
A comparative study of biometric authentication based on handwritten signaturesA comparative study of biometric authentication based on handwritten signatures
A comparative study of biometric authentication based on handwritten signatures
 
A comparative study of biometric authentication based
A comparative study of biometric authentication basedA comparative study of biometric authentication based
A comparative study of biometric authentication based
 
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNNIRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
A Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching SystemA Survey Based on Fingerprint Matching System
A Survey Based on Fingerprint Matching System
 
Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...Computer vision approaches for offline signature verification & forgery detec...
Computer vision approaches for offline signature verification & forgery detec...
 
A new multimodel approach for human authentication sclera vein and finger ve...
A new multimodel approach for human authentication  sclera vein and finger ve...A new multimodel approach for human authentication  sclera vein and finger ve...
A new multimodel approach for human authentication sclera vein and finger ve...
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Multiple features based fingerprint identification system
Multiple features based fingerprint identification systemMultiple features based fingerprint identification system
Multiple features based fingerprint identification system
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEMRELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
RELATIVE STUDY ON SIGNATURE VERIFICATION AND RECOGNITION SYSTEM
 
Signature Verification System using CNN & SNN
Signature Verification System using CNN & SNNSignature Verification System using CNN & SNN
Signature Verification System using CNN & SNN
 
Design of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope methodDesign of digital signature verification algorithm using relative slope method
Design of digital signature verification algorithm using relative slope method
 
IJSRED-V2I2P33
IJSRED-V2I2P33IJSRED-V2I2P33
IJSRED-V2I2P33
 
OSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component VariancesOSPCV: Off-line Signature Verification using Principal Component Variances
OSPCV: Off-line Signature Verification using Principal Component Variances
 
B017150823
B017150823B017150823
B017150823
 
Recent developments in paper currency recognition system
Recent developments in paper currency recognition systemRecent developments in paper currency recognition system
Recent developments in paper currency recognition system
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
N010438890
N010438890N010438890
N010438890
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

Offline and online signature verification systems a survey

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 328 OFFLINE AND ONLINE SIGNATURE VERIFICATION SYSTEMS: A SURVEY Yogesh V.G.1, Abhijit Patil2 1Assistant Professor, Department of MCA, BKIT Bhalki, Karnataka, India 2Assistant Professor, Department of Computer Science, KASC Bidar, Karnataka, India Abstract In recent years, due to the extraordinary diffusion of the internet in our daily life and simultaneously growing need of personal verification in many daily applications has driven signature verification system as an important aspect. This paper presents the survey about the offline & online signature verification system. Feature extraction stage is the most important stage in both on- line & off-line signature verification. The successful implementation of any such verification system depends mainly on how effectively the features have been extracted & used for classification. The robust features yield a successful verification system. Hence, in this paper, we are focusing on to put up with various feature extraction techniques & classifiers employed by various authors to attempt signature verification system. This paper summarizes different techniques used in signature verification system with their merits and demerits. Keywords: offline, online, signature verification. ---------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION In the past few decades the technology is rapidly growing at a very fast pace. Due to the advent of computers & internet lot of transactions are going online as well as offline. The increase in number of transactions is the boon of this latest cutting edge technology that can be done at a mind boggling speed. The technology has increased the convenience but at the same time security is at the stake, lot of false transactions are going around because of forgeries done by some anti-social elements which is leading to huge financial loss to the concerned person & to the society as a whole. We need some mechanism by which we can verify that the concerned transaction is genuine & not the forged one. One useful methodology is the biometric system. It is used to confirm & verify the identity of the concerned user. Biometric are of two types 1) Physical 2) behavioral. In physical biometric individual person’s iris, palm, thumb impression can be used to recognize & verify the individual. Whereas the behavioral biometric could be signature, voice etc. However, if a single biometric of an individual is under study, then it is referred as unimodal biometrics. if more than one biometrics of an individual is used for verification is called as multimodal biometric. In unimodal biometric systems there exists number of problems such as noisy data, spoof attacks, restricted degrees of freedom, intra-class variations, non-universality, and unacceptable error rates. Multimodal biometric system that integrates the evidence presented by multiple sources of information of an individual and it is an alternative to overcome some of the limitations of the unimodal. There are number of algorithms have been presented on multimodal and uinimodal biometrics to deal the authenticity of an individual. However, in this paper, we consolidated the gist of unimodal algorithms and their performance in signature verification system. Signature is an ultimate biometrics to authenticate an individual. The signatures are used in cheques, legal transactions etc to determine the individual identity. The legalization of any document takes place by putting a signature on it. This problem can be dealt in two ways: 1) Online signature verification 2) Offline signature verification In some transactions online signatures are used where the user is provided with a pen based tablet. The user has to do his signature on that tablet then that signature will be recorded in the system/computer. Signature trajectory, pen pressure, pen downs & pen ups will be captured by the tablet & sent to the system/computer. Then it will verify with the database whether it is genuine or forged one. On the other hand offline signature is the one which can be obtained by signing on the simple paper & then scanning it to the computer. Now the system will judge whether it is a genuine or forged one. Offline signature does not require any specific hardware whereas online signatures require a lot of hardware & software to determine genuineness. As a rule it is impossible to know in advance which of the approaches is novel. In this paper, we have done a survey on the various methods used in offline & online signature verification with its accuracies. 1.1 Signature Characteristics A signature is handwritten graphical representation which is used to authenticate individuality. Signature of a person may vary according to his mood, health etc. Even the genuine signer may not replicate his own signature as it is, some
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 329 minor change will be there. Hence, it is difficult to distinguish that whether signature is genuine or forged one. A person’s signature often changes depending on some elements such as mood, fatigue, time etc. Great inconsistency can even be observed in signatures according to their country, habits, psychological or mental state, physical and practical conditions. Signatures can be treated as an image because a person may use any symbol, line, Curve & letter or group of letters as a signature Shown in fig1. Hence it is a perfect candidate for image processing & pattern recognition. Fig.1. A sample of signatures 2 METHODOLOGIES The methodology employed for offline and online signature verification is depicted in Figure 2. The methodology involves signature acquisition, pre-processing, feature extraction and comparison with an enrolled signature template as a knowledge base to draw the decision between genuine and forged one. Each steps of the methodology is explained in the following Subsections. 2.1 Image Acquisition Signature image acquisition is a crucial stage of any recognition system. The resolution, skew and isolated components of signature makes the problem more complex. 2.2 Pre-Processing (Noise Removal) This involves Normalizing, Converting a grey scale image to a binary image or its vice-versa, removing of spurious pixels (noise) etc. 2.3 Feature Extraction Features can be classified in to two types global & local. Global features describe the signature as a whole for ex: width & height of signature, width to height ratio. Local features are confined to a limited portion of the image/signature for ex: a grid of the signature. Fig 2: signature verification system Table -1: Different approaches used in offline signature verification Features Classifiers Dataset Accuracy Random Transform & Fractal Dimension [1] SVM SVC- 2004 - Curve let Transform, edge detection, Hough Transform, [2] Modular Neural Network(MNN)with Mandeni Fuzzy Inference System, Artificial Neural Network Used 270 Images 210- Tranning 60- Testing 96% Projection &Local point ensity,COG, Spatial Frequency Distribution [4] Euclidean Distance ,Least Square Error 100 Image - Statistical Analysis Using Chi- Square Test [6] PSO –NN Algorithm Probability GPDS 78% Projection &Local point Density, COG, Spatial Frequency Distribution [3] Feature Vector, Correlation, Mean & deviation - - Radon Transformation Fractal Dimension With Kart method[5] SVM Based on (SRM) , SVM 3 kernels SVC 2004 92.2% of FAR 10% of FRR Interpolation Using NN KNN, Learning Vector Quantization, Euclidean Distance Metric 945 Signs 94% Energy method ,Directional Feature Method ,Chain Code used as a Directional Feature [ 8 ] Neural Network 100 signs 50forged 50 genuine Global & Local features , Distance Matrices ,Geometric Normalization [9] Euclidean Distance, Gaussian Empirical Rule, CMC curve 5400 Signs 97.17%
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 330 Static Image Processing , Novel Feature Extraction [ 10 ] Euclidean Distance 160Signs 80 genuine 80 Skilled forged FAR is 1% FRR is 0.5% Grid Features , Global Features [11] KNN Classifier , Neural Network(NN) 600 sign FAR is 4.16 FRR is 7.51% Binary Feature Vector , Gradient Direction Extraction, Aquinas Spatial Pyramid [14] Automatic Classifier & Manual Classifier CEDAR & GPDS 92% on CEDAR , 87% on GPDS Discrete Wavelet Transformation , Image Registration , Image Fusion [12] Registration by finding COG & with Euclidean Distance 90 sign 92.2% Graph Matching(Bipartite Graph) , Radon Transformation [13] Euclidean Distance , Cross Validation , HMM , Hungarian Method - Vigorous research has been pursued in signature verification System for a number of years. In the area of Signature verification, especially offline Signature verification, different technologies have been used and still the area is to be explored. The techniques used by different researchers differ in the type of features extracted, the training and testing methods used, and classification, verification model used. 2.4 Comparison/Classification: This is based on an algorithm which is capable of deciding whether to accept or reject the Signature which is under test. False Acceptance Rate :the probability that the system incorrectly matches the input pattern to a non-matching template in the database. It measures the percent of invalid inputs which are incorrectly accepted. In case of similarity scale, if the person is an imposter in reality, but the matching score is higher than the threshold, then he is treated as genuine. False Rejection Rate: the probability that the system fails to detect a match between the input pattern and a matching template in the database. It measures the percentage of valid inputs which are incorrectly rejected. Table 1 depicts the different approaches used in offline sign verification along with its accuracy. Table 2 depicts the different approaches used in online sign verification along with its accuracy Table -2: Different approaches used in online signature verification Features & Classifiers Dataset Users/Sig Accuracy BPNN, Probabilistic model & Fusion [15] SVC 2004 FRR=0.3 FAR=0.5 Dynamic time warping [16] SVC 2004 FRR=5.5 FAR=4.13 Support Vector Machines Based on LCSS Kernel Function[17] SVC 2004 ERR 6.84 Neural Networks Classifiers & Fuzzy Inference[24] 20/600 FRR=21.5 FAR=3.5, FRR=3.5 FAR=0.0 HMM/ANN[18] MCYT ERR 0.12 PWC ,HMM [ 20] MCYT EER 6.67 EER 2.12 Bp ANN 150 FRR:1.8 FAR: 2 Bayes classifiers [22] 94/1247 FRR:2.19 FAR: 3.5 HMM [ 21 ] 2/120 FRR:6.67 FAR:0.0 40/1440 FRR:9.94 FAR:0.5 2/1100 FRR:11.3 FAR:2.0 String Matching [ 20] 102/1232 FRR:2.8 FAR:1.6 PDF Classifiers [19] 5/25 FAR:5 3. OUR FUTURE WORK As we could observe, despite the vast amount of work performed thus far for offline & online signature verification, there are still many challenges in this research area. Signatures may be written in different languages and we need to undertake a systematic study on this. One problem of this area is, for security reasons, it is not easy to get a signature dataset of real signatures (such as banking documents) available to the signature verification system. Publicly availability of signature datasets of real documents would make it possible to define a common experimentation protocol in order to perform comparative studies in this field. Researchers have used different features for signature verification. Combination of different classifiers as well as novel classifiers should be explored in future work to enhance performance.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 331 4. CONCLUSIONS According to our study, in the learning process & in the training process of the system there is still room for the enhancement of the result. As the above described study shows that the algorithm which is used to analyze complex strokes of the signatures is still not satisfying. There is still further scope of improvement. Accordingly in this survey we noted that all the published work is based on foreground information. A combination of background and foreground information may be considered for better results in the future. ACKNOWLEDGEMENTS We express our sincere gratitude to Dr .Mallikarjun Hangarge for supporting us in the entire manner for writing the paper. REFERENCES [1] K. N. Pushpalatha, Aravind Kumar Gautham, D. R.Shashikumar,K. B. ShivaKumar, and Rupam Das ”Offline Signature Verification with Random and Skilled Forgery Detection Using Polar Domain Features and Multi Stage Classification-Regression Model”, International Journal of Advanced Science and Technology, Vol.59, (2013), pp.27-40 . [2] Omid Mirzaei , Hassan Irani and Hamid Reza Pourreza “Offline Signature Recognition using Modular Neural Networks with Fuzzy Response Integration”, 2011 International Conference on Network and Electronics Engineering, IPCSIT vol.11 (2011) © (2011) IACSIT Press, Singapore. [3] Khamael Abbas, Al-Dulaimi ”Handwritten Signature Verification Technique Based on Extract Features“, International Journal of Computer Applications (0975 – 8887), Volume 30– No.2, September 2011. [4] Priya Metri, Ashwinder Kaur, “Handwritten Signature Verification using Instance Based Learning”, International Journal of Computer Trends and Technology- March to April Issue 2011. [5] Mehdi Radmehr, Seyed Mahmoud Anisheh,Mohsen Nikpour,Abbas Yaseri, “Designing an Offline Method for Signature Recognition”, World Applied Sciences Journal 13 (3): 438-443, 2011,ISSN 1818-4952,© IDOSI Publications, 2011 [6] M Taylan Das, Canan Dulger,H. Ergin Dulger, ”Offline signature Verification (SV) using the Chi- square statistics”, International Journal of Biometrics, Volume 3 Issue 1, December 2011,Pages 2-12. [7] Srikanta Pal,Michael Blumenstein,Umapada Pal,“ Automatic Off-Line Signature Verification Systems: A Review”, IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology (ICWET), (14):20-27, 2011. [8] Minal Tomar and Pratibha Singh, “A Directional Feature with Energy based Offline Signature Verification Network”, International Journal on Soft Computing ( IJSC ), Vol.2, No.1, February 2011. [9] Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing,”Offline Signature Identification by Fusion of Multiple Classifiers using Statistical Learning Theory”, International Journal of Securityand Its Applications,Vol. 4, No. 3, July, 2010. [10] Dr. Daramola Samuel, Prof. Ibiyemi Samuel, “Novel Feature Extraction Technique For Off-line Signature Verification System”, International Journal of Engineering Science and Technology Vol. 2(7), 2010, 3137-3143. [11] Shashi Kumar D. R, K. B. Raja, R. K. Chhotaray, Pattanaik Sabyasachi,” Off-line Signature Verification Based on Fusion of Grid and Global Features Using Neural Networks” , International Journal of Engineering Science & Technology, vol.2(12), 2010, 7035-7044. [12] Samaneh Ghandali,Mohsen Ebrahimi Moghaddam,“Off- Line Persian Signature Identification and Verification Based on Image Registration & Fusion”, Journal of Multimedia, Vol. 4,No 3, (2009), 137,144, Jun 09. doi:10.4304/jmm.4.3.137-144. [13] Ramachandra A C, Ravi J, K B Raja,Venugopal K R And L.M Patnaik,”Signature Verification using Graph Matching and Cross-Validation Principle”, International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009. [14] Larkins, Mayo M.,”Adaptive Feature Thresholding for off-line signature verification”, Image and Vision Computing New Zealand, 2008. IVCNZ 2008, 23rd International Conference, page no:1-6. [15]. Dr.Mohammed J. Alhaddad”, Multiple Classifiers to verify the Online Signature”, World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221- 0741Vol. 2, No. 2, 46-50, 2012. [15] Ahmed Galib Reza,Hyotaek Lim & Md Jahangir Alam, “An Efficient Online Signature Verification Scheme Using Dynamic Programming Of String Matching”, ICHIT 2011,LNCS 6935,pp.590- 597,2011. [16] Gruber C, Gruber T, Krinninger S, Sick B. ”Online Signature Verification With Support Vector Machines Based on LCSS Kernel Functions”, Published in: Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on (Volume:40 , Issue:4 ), Biometrics Compendium, IEEE,Publication Year:2010, Page(s): 1088 – 1100. [17] Zhong-HuaQuan, De-Shuang Huang, Kun-Hong Liu, Kwok-Wing Chau,“A Hybrid HMM/ANN Based Approach for Online Signature Verification“,Published in:, Neural Networks, IJCNN 2007, page no 402-405. [18] Kiran, G.V., Kunte, R.S.R., Samuel, S. “On-line signature verification system using probabilistic feature modeling”,Published in:Signal Processing and its Applications, Sixth International, Symposium on 2001 (Volume:1 ), page no:355. [19] A.K Jain, F.D Griess, & S.D.Connell,”Online Signature Verification”, Pattern Recognition, 35(2002)2963- 2972.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 332 [20] Mingfu Zou , Jianjun Tong , Changping Liu, Zhengliang Lou “On-line signature verification using local shape analysis” , Published in: Document Analysis and Recognition, 2003. Proceedings,page no:314-318,vol. 1. [21] Alisher Kholmatov, Berrin Yanikoglu “Biometric Authentication Using Online Signatures “,In Proc. ISCIS, Springer LNCS-3280 (2004) 373– 380. [22] Julian Fierrez Aguilar, Loris Nanni, Jaime Lopez ”An OnLine Signature Verification System Based on Fusion of Local and Global Information”, T. Kanade, A. Jain, and N.K. Ratha (Eds.): AVBPA 2005, LNCS 3546, pp. 523–532, 2005, Springer-Verlag Berlin Heidelberg 2005. [23] M.Khalid, Hamam Mokayed, R.Yusof and OsamuOno,”Online Signature Verification with Neural Networks Classifier and Fuzzy Inference”, Third Asia International Conference on Modelling & Simulation, 2009, AMS09, page no:236-241.